Analysis

  • max time kernel
    13s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2024 20:19

General

  • Target

    246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32.exe

  • Size

    128KB

  • MD5

    71f0c1101306ebd89735b734b500fe10

  • SHA1

    398028832a41b64f1f1b0e865a3cccb922350fb2

  • SHA256

    246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32

  • SHA512

    80497083cd21b2ae986c80378f30c6d3ad597a5720c776de5abc51ff732a8b566e0f7ae7f7f91c868443e17a1b60f1b0bfb54fa9eb3de37b4ab7454b6cffba25

  • SSDEEP

    3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0G:o6z5HVpQ89gEK/0

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32.exe
    "C:\Users\Admin\AppData\Local\Temp\246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/848-0-0x000007FEF64A3000-0x000007FEF64A4000-memory.dmp

    Filesize

    4KB

  • memory/848-1-0x0000000000D60000-0x0000000000D86000-memory.dmp

    Filesize

    152KB

  • memory/848-2-0x000007FEF64A0000-0x000007FEF6E8C000-memory.dmp

    Filesize

    9.9MB

  • memory/848-4-0x000007FEF64A0000-0x000007FEF6E8C000-memory.dmp

    Filesize

    9.9MB